I am a great believer that good security comes from a multilayer approach. You don't lock your front gate and leave all the doors open, right? So why should IT security differ? This article looks at an interesting list of the "Top 20" critical security controls published recently by Centre for the Protection of National Infrastructure (CPNI). CPNI was formed from the merger of the National Infrastructure Security Co-ordination Centre (NISCC) and the National Security Advice Centre (NSAC), formerly part of MI5 the UK's Security Service and have responsibility for providing Information Assurance guidance for the UK's national infrastructure.
Here is the list:
- Inventory of Authorized and Unauthorized Devices
- Secure Configurations (Hardware & Software)
- Secure configurations for hardware and software on laptops, workstations, and servers
- Continual Vulnerability Assessment
- Malware Defenses
- Application Software Security
- Wireless Device Control
- Data Recovery Capability
- Training
- Secure configurations for network devices such as firewalls, routers, and switches
- Limit network ports, protocols and services
- Controlled use of Admin privileges
- Boundary Defense
- Maintenance and Monitoring
- Need to know permissions
- Account monitoring and control
- Data Loss Prevention
- Incident Response
- Secure network engineering
- Penetration Tests
Being in security for the past 4 years I have audited and tested the security defenses of 100+ organizations and I can honestly say I have never seen any one organization conducting satisfactory controls in all these areas, if any at all. Therefore, I suggest any organization review this list and either use it as a basis for their IT Security Policy (if they have one) or conduct a simple audit of their systems against this list. If you have gone as far as classifying the information that flows in and out of your organization you may want to use this list per classification.
My particular favorites are Training and Penetration Tests. This maybe a I have conducted many Social Engineering and Penetration Tests, but these really standout for me. Penetration Testing is a key indicator that the other 19 controls are working, and any tests they do not include elements of Social Engineering really are not true tests of the threats faced by organizations today. Just look at RSA.....
References:
http://www.cpni.gov.uk/advice/infosec/Critical-controls/
No comments:
Post a Comment